Sciweavers

95 search results - page 4 / 19
» Privacy is Not an Option: Attacking the IPv6 Privacy Extensi...
Sort
View
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
16 years 3 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
CCS
2006
ACM
15 years 5 months ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
135
Voted
BIOSURVEILLANCE
2008
Springer
15 years 3 months ago
A Temporal Extension of the Bayesian Aerosol Release Detector
Early detection of bio-terrorist attacks is an important problem in public health surveillance. In this paper, we focus on the detection and characterization of outdoor aerosol rel...
Xiaohui Kong, Garrick L. Wallstrom, William R. Hog...
ACMICEC
2007
ACM
115views ECommerce» more  ACMICEC 2007»
15 years 5 months ago
An economic model of portal competition under privacy concerns
Due to inherent privacy concerns, online personalization services such as those offered through toolbars and desktop widgets are characterized by "no-free-disposal" (NFD...
Ramnath K. Chellappa, Raymond G. Sin
ESORICS
2011
Springer
14 years 1 months ago
A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds
Abstract. Cloud computing is a new computing paradigm that is gaining increased popularity. More and more sensitive user data are stored in the cloud. The privacy of users’ acces...
Ka Yang, Jinsheng Zhang, Wensheng Zhang, Daji Qiao